unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Simulation of cyber-attacks: Customize and automate your company’s security validation
1. BAS technology, an ally to automate security validation1.1. MITRE-ATT&CK, a framework that...
2022-12-14 19:11:15 | 阅读: 22 |
收藏
|
Tarlogic Security - www.tarlogic.com
simulation
security
bas
analysis
Global security assessment: Knowing the weaknesses to address them
1. A complex context and an increasingly digitalized world2. Objectives of the global security...
2022-12-13 17:3:21 | 阅读: 17 |
收藏
|
Tarlogic Security - www.tarlogic.com
security
attackers
objectives
analysis
OWASP FSTM, Stage 9: Exploitation of executables
1 Techniques for exploitation of executables1.1 Buffer overflow1.2 Format string attack1.3 Hea...
2022-12-7 16:11:43 | 阅读: 20 |
收藏
|
Tarlogic Security - www.tarlogic.com
memory
overflow
attacker
nx
oriented
The 5 keys to a security risk assessment
1. What is a security risk assessment?2. Why is it important?2.1. Preventing security incident...
2022-12-1 00:32:42 | 阅读: 13 |
收藏
|
Tarlogic Security - www.tarlogic.com
security
threats
objectives
malicious
OWASP FSTM, step 8: Runtime analysis
1. Main techniques for perform a runtime analysis2. Instrumentation and debugging2.1. Hardware...
2022-11-29 16:3:44 | 阅读: 12 |
收藏
|
www.tarlogic.com
software
analysis
hardware
debugger
development
OWASP FSTM, step 7: Dynamic analysis
1. Debugging using emulation techniques2. Physical port depuration3. Traditional pentest4. Fuz...
2022-11-22 23:41:48 | 阅读: 17 |
收藏
|
www.tarlogic.com
analysis
firmware
bootloader
hardware
emulation
OWASP FSTM step 6: firmware emulation
1. Firmware emulation, the path2. Firmware emulation ways3. Emulation tools3.1 QEMU3.2 Unicorn...
2022-11-16 01:20:24 | 阅读: 19 |
收藏
|
www.tarlogic.com
emulation
firmware
emulate
emulated
unicorn
Hacking of social network accounts and creation of fake profiles: No one is safe
1. Creation of fake profiles to commit fraud1.1. Fake accounts of managers of financial instit...
2022-11-10 17:25:52 | 阅读: 16 |
收藏
|
www.tarlogic.com
network
victim
influencers
hijacking
attackers
Stolen accounts, IPTV apps and pirate platforms: how audiovisual fraud work
1. Back to the future: Audiovisual fraud is not new, but it’s on the rise2. Streaming Wars: Cr...
2022-11-3 19:29:19 | 阅读: 26 |
收藏
|
www.tarlogic.com
audiovisual
iptv
criminal
fight
satellite
Wi-Fi Sniffer for Windows and 802.11 packet viewer
WiFi card with monitor mode supportInstalling Acrylic Wi-Fi SnifferUsing the Sniffer: Wire...
2022-10-29 15:0:54 | 阅读: 50 |
收藏
|
www.tarlogic.com
sniffer
acrylic
windows
analyzer
network
One shell to HANDLE them all
IntroductionContextClassificationSecurity context switchAccess to network resourcesProof of co...
2022-10-26 16:0:0 | 阅读: 18 |
收藏
|
www.tarlogic.com
security
network
windows
One shell to HANDLE them all
IntroductionContextClassificationSecurity context switchAccess to network resourcesProof of co...
2022-10-26 16:0:0 | 阅读: 26 |
收藏
|
www.tarlogic.com
security
network
windows
Counter-Phishing: Anticipating the criminals
The constant evolution of phishing campaignsOriginCampaign sophisticationFollow the money and...
2022-10-20 15:15:1 | 阅读: 22 |
收藏
|
www.tarlogic.com
phishing
fraudulent
banks
malicious
security
CVE-2022-42889: Text4Shell, Critical Vulnerability in Apache Commons Text
CVE-2022-42889: Key FeaturesText4Shell mitigationExamples of code vulnerable to CVE-2022-42889...
2022-10-18 22:54:26 | 阅读: 28 |
收藏
|
www.tarlogic.com
42889
library
tarlogic
remote
text4shell
CVE-2022-42889: Text4Shell, Critical Vulnerability in Apache Commons Text
CVE-2022-42889: Key FeaturesText4Shell mitigationExamples of code vulnerable to CVE-2022-42889...
2022-10-18 22:54:26 | 阅读: 67 |
收藏
|
www.tarlogic.com
42889
library
tarlogic
text4shell
remote
Essential cybersecurity services in the digital age
1. No organization can turn its back on cybersecurity1.1. Crises in the digital world move to...
2022-10-13 15:2:25 | 阅读: 11 |
收藏
|
www.tarlogic.com
security
threats
phishing
cloud
Essential cybersecurity services in the digital age
1. No organization can turn its back on cybersecurity1.1. Crises in the digital world move to...
2022-10-13 15:2:25 | 阅读: 18 |
收藏
|
www.tarlogic.com
security
threats
phishing
cloud
OWASP FSTM, stage 5: Analyzing filesystem contents
Boot processSearching files of interestAutomation toolsFirmwalkerThe Firmware Analysis and Com...
2022-10-6 14:59:54 | 阅读: 19 |
收藏
|
www.tarlogic.com
ro
dummy
analysis
firmware
udev
OWASP FSTM, stage 5: Analyzing filesystem contents
Boot processSearching files of interestAutomation toolsFirmwalkerThe Firmware Analysis and Com...
2022-10-6 14:59:54 | 阅读: 33 |
收藏
|
www.tarlogic.com
ro
dummy
analysis
udev
cinfo
Google messes up: Office 365 login portal is not from Microsoft
«Office 365 login» With those words, many people start their workday to authenticate to Mic...
2022-10-3 22:49:20 | 阅读: 21 |
收藏
|
www.tarlogic.com
godaddy
microsoft
malicious
ends
Previous
4
5
6
7
8
9
10
11
Next